relational database

 

Directions:

  1. Create a login demo video or screenshots and login code.
  2. Create a connection demo video or screenshots and connection code.

 NOTE: You should have your detailed design and a development schedule.  One of the first things that you should do is to verify connections.  If you have a database, a simple login page is good to verify that your software can connect and read from the database.  If you are using two or more components, it’s good to verify that you can get them to interact.  Component integration frequently takes more time than anticipated, and it’s a good idea to work that out early rather than leaving it for later.  If you are using any environments or components for the first time, it’s good to verify that you all your pieces working at a basic level before doing detailed work.  In any case, this is the week to start your development in earnest! 

 

Relational DatabasesDownload Relational Databases

Database Design Basics Links to an external site.(it’s for MS Access, but the design principles apply to any relational database)

SQL ZooLinks to an external site.

W3Schools SQL

PROGRAMMING

 In this exercise, you create a program for the sales manager at Computer Haven, a small business that offers motivational seminars to local companies. Figure 7-53 (SEE ATTACHED BELOW) shows the charge for attending a seminar. Notice that the charge per person depends on the number of people the company registers. For example, the cost for four registrants is $400; the cost for two registrants is $300. The program should allow the sales manager to enter the number of registrants for as many companies as needed. When the sales manager has finished entering the data, the program should calculate and display the total number of people registered, the total charge for those registrants, and the average charge per registrant. For example, if one company registers four people and another company registers two people, the total number of people registered is six, the total charge is $700, and the average charge per registrant is $116.67. 

 a.  Create an IPO chart for the problem and then desk-check the algorithm appropriately.

b.  List the input, processing, and output items, as well as the algorithm, in a chart similar to the one shown earlier in Figure 7-42. Then code the algorithm into a program.

c.  Desk-check the program using the same data used to desk-check the algorithm.

d.  If necessary, create a new project named Advanced25 Project, and save it in the Cpp8Chap07 folder. Enter your C++ instructions into a source file named Advanced25.cpp. Also, enter appropriate comments and any additional instructions required by the compiler. Display the average charge with two decimal places.

e.  Save and then run the program. Test the program using the same data used to desk-check the program. 

FIGURE 7-53 (ATTACHED)

FIGURE 7-42 (ATTACHED

SAVE FILE AS HOMEWORK/3.CPP

DG

Start your paper with an introductory paragraph. total 7-9 pages and references at least 4 sources cited.

  • Prompt 1 Blockchain (2-3 pages): Explain the major components of a blockchain. Be sure to include how blockchain is affecting the global economy and how you see it growing in the future.
  • Prompt 2 Big Data (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.
  • Prompt 3 Government and Policies (2-3 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discuss what policies should be put in place.

Conclude your paper with a detailed conclusion section (1-2 pages long).

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Blockchain Technology

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. Once you find the article, you will read it and write a review of it.  This is considered a research article review. Your paper should meet these requirements: 

  • Be four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Appendix

Appendix A: Final Project Overview In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations. The organization is growing and expanding their operations with the acquisition of a plant in China as well as several other offices throughout the United States. The following are the requirements for the new wide area network. • The network must be designed using all new equipment. • The design document must recommend the types of lines that should be used for each location (i.e. Ethernet, fiber, satellite, and so forth). • There are multiple departments that must be grouped logically to address security. Locations: o Headquarters—Atlanta, Georgia houses corporate operations, marketing, administrative staff, and accounting o Engineering—Atlanta, across from headquarters: houses sales and engineering o Distribution offices—Chicago, Phoenix, and New York: Each distribution office has a small sales staff and administrative staff. o Plant facility—China • Weekly meetings are held in the corporate conference room at headquarters, with people attending from multiple locations, including China, New York, Chicago, and Phoenix.
 

Develop a plan to set up a wide area network based on the scenario presented in Appendix A. Your plan must include the following:
o An overview of the company and its needs
o A logical network drawing for Acme to depict the recommended WAN
o Recommendations for the type of leased lines the company should choose at each location, how each location will connect to headquarters, and whether or not each location should be able to connect with the others
o Recommendations for what type of telecommunications system would work best for Acme: PBX or VoIP
o The IP address scheme, including the range of IP addresses, broadcast addresses, and subnets
o A VLAN to appropriately address Acme’s concerns that departments that are not grouped together are logically connected
o Recommendations for network equipment that should be placed at each location; also consider equipment based on the teleconferencing needs
o Protocols that will be used for the routers at each location
o Recommendations for wireless technology
o Recommendations for securing the network

Windy 8-Puzzle Problem in C++ or JAVA

 Windy 8-Puzzle Problem

We consider a variant of the 8-puzzle problem (http://tristanpenman.com/demos/n-puzzle) under

a windy condition. The initial state and the goal state are shown as follows: We assume that the wind.

Please look the instructions in the attachments.

Important: 

 In your report, please provide the screenshots of all outcomes, and the highlighted code segments

and the detailed explanation on how you implement the followings:

ˆ Data structure: priority queue for frontier set and hash table for explored set;

ˆ Calculation of f(n) = g(n) + h(n);

ˆ Adding leaves for expansion;

ˆ Picking the smallest f(n).

Each screenshot should include your usernames and the current time, which show that you did it by

yourselves.

quick work

Objectives:

You will learn about compression utilities speed vs compression rate.

Instructions:

Time Required: 30 minutes

  1. Use Ubuntu VM or Subsystem to create a new directory with the name ec4 Navigate to the new directory Take a screenshot
  2. Create a new text file and name it mylargefile.txt and type your first and last name 100 times in the created text file as follows:
  3. Take a screenshot then save the large text file and Exit.
  4. Tar the large text file “mylargefile.txt” using the three utilities learned in lesson
    11 by typing:
    tar -czf gzarchive.tar.gz mylargefile.txt tar -cjf bz2archive.tar.bz2 mylargefile.txt tar -cJf xzarchive.tar.xz mylargefile.txt
    Take a screenshot showing all three commands above.
  5. Type ls -la to get a detailed view of your files and Take a screenshot
  6. What is the size of each one of the three compressed archives (gzarchive.tar.gz, bz2archive.tar.bz2, xzarchive.tar.xz) in Kilobytes ? _______________________________________________________________
          _______________________________________________________________ 
  7. Run the following commands to check the compression time using the three compression utilities:
    time bzip2 -1v bz2archive.tar.bz2
    time gzip -1v gzarchive.tar.gz

page1image10817280 page1image10817472 page1image4541280 page1image10817664 page1image10817856page1image10818048

time xz -1v xzarchive.tar.xz Take a screenshot

page1image10818240

IS 552/452 Unix Operating System Principles Spring 2022

8. Rank all three utilities (gzip, bizp2, and xz) according to their compression time from faster to slower.

    ________________________________________________________________
    ______________________________________________________________

What to Submit

Submit all Screenshots and answers to questions in a word document and upload your document 

Rubric

5 screenshots = 75 points
2 questions = 25 points (12.5 each)

Week 2

 

Instructions

Week 2 Assignment:

In order to complete assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of one (1) full page in length with a minimum of two (2) outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

                               (TOPIC BELOW)

Describes the steps involved in resetting the root password in Windows.

Operations and Buiness performance

 Based on the Harvard Business School Case “Trader Joe’s” prepare a 3-5 page case study analysis.  This paper should follow APA formatting, be double spaced, and include title and reference pages 

https://moodle.ab.edu/pluginfile.php/503404/mod_resource/content/2/TraderJoes.pdf